What Happened in the U.S. Department of the Treasury Breach? A Detailed Summary

What Happened in the U.S. Department of the Treasury Breach? A Detailed Summary

| | Breach explained
The U.S. Department of the Treasury suffered a major security incident when a Chinese threat actor compromised its third-party cybersecurity service BeyondTrust. The attackers obtained an API key that allowed them to bypass security measures and access unclassified documents ... Read More
The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

| | Security Research
On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of GitGuardian’s data in understanding supply chain attacks ... Read More
Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem

Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem

| | Conferences
Come for the cybersecurity insights, stay for the raclette! Black Alps 2024 packed in Swiss charm with technical talks, a hacker's raclette dinner, and conference-logo chocolates. A perfect mix of threats, treats, and networking ... Read More
Add GitGuardian Secrets Detection To Jira Cloud

The extent of Hardcoded Secrets: From Development to Production

| | Secrets detection
While code repositories are the major source, GitGuardian data reveals the full scope of secret sprawl: for every 42 secrets found in code, 1 is found in ticketing systems like JIRA; for every 21, 1 is in collaboration tools like Confluence; and for every 9, 1 is in messaging systems ... Read More
Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers: Why Deleted Layers Can Still Haunt You

Docker Zombie Layers are unreferenced image layers that continue to exist for weeks in registries, even after being removed from a manifest. In this hands-on deep dive, we explore how these layers can persist in registries and why ensuring the immediate revocation of exposed secrets is critical ... Read More
How Popular Malware Is Stealing Credentials and What You Can Do About It

How Popular Malware Is Stealing Credentials and What You Can Do About It

| | Secrets detection
Credentials are prime targets for attackers, as they make it easy to access resources as legitimate users without discovering vulnerabilities or using technical exploits. Malware authors know how interesting these low-hanging fruits are and are coming after your secrets! ... Read More
Demystifying Github Cached Views - The Hidden Danger

Demystifying Github Cached Views – The Hidden Danger

Some explanations about the hidden danger of GitHub features that allow anyone to access commits you thought had been deleted ... Read More